Cryptography Authentication and Data Integrity Aims of Authentication Authentication with Symmetric Key Encryption Authentication with Hash Functions Authentication with MACs Digital Signatures
1/27
Authentication and Data Integrity
Cryptography
School of Engineering and Technology CQUniversity Australia
Prepared by Steven Gordon on 15 Apr 2020, auth.tex, r1850